CUPRINS Universitatea De Stat Din Moldova Mic Dicţionar De Termeni Informatici

Total Page:16

File Type:pdf, Size:1020Kb

CUPRINS Universitatea De Stat Din Moldova Mic Dicţionar De Termeni Informatici CUPRINS Universitatea de Stat din Moldova Mic dicţionar de termeni informatici................................................... 10 CAPITOLUL I. SISTEMUL DE OPERARE MS DOS...................... 13 Facultatea Matematică şi Informatică Laboratorul I.1. Comenzile de manipulare a unui disc şi a Catedra Tehnologii de Programare directoarelor ...................................................................................13 I.1.1. Schimbarea unităţii curente în cea specificată.....................13 I.1.2. Crearea unui director nou ....................................................14 I.1.3. Copierea directoarelor..........................................................15 I.1.4. Schimbarea numelui unui director.......................................15 I.1.5. Ştergerea unui director cu conţinutul vid.............................16 BOIAN Elena CĂPĂŢÂNĂ Gheorghe I.1.6. Ştergerea unui director şi a subdirectoarelor sale ................16 PREPELIŢĂ Aurelia SEISIUC Eleonora I.1.7. Afişarea fişierelor unui director...........................................17 I.1.8. Schimbarea directorului curent...........................................18 I.1.9. Conţinutul lucrării................................................................18 I.1.10. Model de realizare a lucrării ..............................................18 Laboratorul I.2. Comenzile privitoare la fişiere.............................20 SISTEME DE OPERARE: I.2.1. Crearea unui fişier textual....................................................20 MS/DOS, WINDOWS, UNIX I.2.2. Afişarea conţinutului unui fişier textual ..............................21 I.2.3. Editarea conţinutului unui fişier textual...............................21 Îndrumar pentru lucrări de laborator I.2.4. Comanda COPY ..................................................................21 I.2.5. Fuziunea fişierelor ...............................................................22 I.2.6. Deplasarea fişierelor specificate într-un nou loc .................22 I.2.7. Ştergerea fişierelor specificate de pe suport ........................23 I.2.8. Conţinutul lucrării................................................................23 I.2.9. Model de realizare a lucrării ................................................24 Laboratorul I.3. Specificarea căilor de căutare a fişierelor executabile .....................................................................................25 I.3.1. Comanda PATH ...................................................................26 Chişinău - 2005 I.3.2. Conţinutul lucrării...............................................................26 I.3.3. Model de realizare a lucrării .............................................27 Laboratorul I.4. Redirectarea datelor de intrare/ieşire, organizarea conveierelor de comenzi şi filtrarea datelor...................................29 I.4.1. Redirectarea datelor de intrare/ieşire ...................................29 I.4.2. Filtrul ...................................................................................30 I.4.3. Comanda FIND....................................................................30 1 2 I.4.4. Comanda MORE ..................................................................31 III.1.7. Programul VALIDATE ......................................................59 I.4.5. Comanda SORT....................................................................32 III.1.8. Programul VSHIELD.........................................................59 I.4.6. Conţinutul lucrării................................................................32 III.1.9. Întrebări pentru recapitulare..............................................59 I.4.7. Model de realizare a lucrării ................................................32 III.1.10. Teme pentru acasă...........................................................59 Laboratorul I.5. Fişiere de comenzi ...............................................34 CAPITOLUL IV. PROGRAMELE DE ARHIVARE ......................... 59 I.5.1. Definiţie ...............................................................................34 IV.1. Fişierele arhivă......................................................................60 I.5.2. Execuţia pe paşi a unui fişier de comenzi............................35 IV.2. Transferul fişierelor în arhivă ...............................................62 I.5.3. Comanda CALL....................................................................35 IV.3. Extragerea fişierelor din arhivă.............................................63 I.5.4. Comanda SHIFT .................................................................36 IV.4. Întrebări pentru recapitulare..................................................64 I.5.5. Comanda REM.....................................................................36 IV.5. Teme pentru lucrări de laborator ..........................................64 I.5.6. Comanda ECHO ..................................................................36 I.5.7. Comanda FOR .....................................................................37 CAPITOLUL V. SISTEMUL DE OPERARE WINDOWS................ 66 I.5.8. Efectuarea salturilor în fişierele de comenzi........................38 V.1. Facilităţile sistemului de operare Windows ...........................66 I.5.9. Comanda PAUSE.................................................................38 Laboratorul V.1. Suprafaţa de lucru şi utilizarea şoricelului .........70 I.5.10. Comanda IF ......................................................................39 V.1.1. Lansarea sistemului de operare Windows. Suprafaţa de I.5.11. Comanda CHOICE ...........................................................40 lucru...............................................................................................70 I.5.12. Conţinutul lucrării..............................................................41 V.1.2. Manevrarea ferestrelor .......................................................79 I.5.13. Model de realizare a lucrării .............................................42 V.1.3. Folosirea meniurilor ...........................................................87 V.1.4. Casetele de dialog...............................................................88 CAPITOLUL II. SISTEMUL NORTON COMANDER.....................42 V.1.5. Memoria Clipboard............................................................95 Laboratorul II.1. Sistemul Norton Commander (NC)....................42 V.1.6. Tastele operative ................................................................97 II.1.1. Produsul program Norton Commander ..............................42 V.1.7. Comenzile rapide pe suprafaţa de lucru .............................99 II.1.2. Bar-meniul inferior.............................................................45 V.1.8. Meniul de bază Start.........................................................100 II.1.3. Bar-meniul superior............................................................46 V.1.9. Finalizarea lucrului cu Windows. Reîncărcarea II.1.4. Elaborarea unui meniu al utilizatorului final......................47 calculatorului...............................................................................102 II.1.5. Exemplu..............................................................................49 V.1.10. Întrebări pentru recapitulare...........................................104 II.1.6. Întrebări pentru recapitulare ...............................................50 V.1.11. Executarea lucrării..........................................................105 II.1.7.Temă pentru acasă ...............................................................50 Laboratorul V.2. Aplicaţia Windows Explorer ............................106 CAPITOLUL III. SISTEMELE ANTIVIRUS....................................50 V.2.1. Aplicaţia Windows Explorer............................................106 Laboratorul III.1. Sistemele antivirus ............................................50 V.2.2. Deschiderea dosarelor şi lansarea programelor................109 III.1.1. Virusul informatic .............................................................50 V.2.3. Crearea dosarelor şi fişierelor ..........................................109 III.1.2. Moduri de răspândire a viruşilor.......................................52 V.2.4. Sortarea fişierelor .............................................................110 III.1.3. Mecanismul de contaminare .............................................53 V.2.5. Selectarea dosarelor şi fişierelor ......................................111 III.1.4. Detecţia viruşilor...............................................................56 V.2.6. Copierea dosarelor şi fişierelor ........................................111 III.1.5. Sumele de control..............................................................56 V.2.7. Deplasarea dosarelor şi fişierelor .....................................112 III.1.6. Devirusarea .......................................................................57 V.2.8. Redenumirea dosarelor şi fişierelor..................................114 3 4 V.2.9. Ştergerea dosarelor şi fişierelor........................................114 V.5.7. Aplicaţia MS-DOS Prompt...............................................154 V.2.10. Restabilirea obiectelor şterse..........................................115 V.5.8. Lansarea programelor cu ajutorul comenzii Run .............155 V.2.11. Înrebări pentru recapitulare ............................................117 V.5.9. Crearea/excluderea unui dosar în meniul Programs........156 V.2.12. Executarea lucrării..........................................................117
Recommended publications
  • Muuglines the Manitoba UNIX User Group Newsletter
    MUUGLines The Manitoba UNIX User Group Newsletter Volume 28 No. 10, June 2016 Editor: Bradford C. Vokey Next Meeting: June 14th, 2016, )here to Find the Meeting 7:30 pm University of Winnipeg Room 1M28 Manitoba Hall Main Topic: Gentoo Eric Raine will be presenting on the Gentoo Linux Dist. Differ- ences in installation from Ubuntu will be covered. Also covered is how to configure installation of packages and update. entoo is a free operating s!stem based on either Linux or Free#$D that can be automaticall! optimi%ed and customized for just about any applic- ation or need. RTFM: Termina Control Commands Due to a recent influx of new and novice members 'revor Cordes will be doing an R'") instead of a daemon dash this month. The topic is something ever! *+,- user should master. terminal control commands (i.e.0 ^2 and ^L3 and rudimentar! job control. These little dual ke! presses will streamline !our terminal sessions and make you more efficient. 4ou5ll wonder how you ever got b! without them6 Door %rize'#( )eetings are held in the University of Winnipeg's 'his month we will be giving )anitoba Hall (marked “M” on the map30 along awa! the O8Reill! book #almoral Street south of Ellice Avenue. We can be "Using csh & tcsh"0 found in room 1)@A0 but may occasionall! get b! Paul Du#ois. relocated to nearb! rooms. If there is a change0 it should be conve!ed via a sign on the door to 1)@A. Type Less, Accomplish More. Doors are usuall! open b! 7.CC pm with the meeting starting at 7.DC pm.
    [Show full text]
  • Metadefender Core V4.12.2
    MetaDefender Core v4.12.2 © 2018 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of Metadefender Core 14 1. Quick Start with Metadefender Core 15 1.1. Installation 15 Operating system invariant initial steps 15 Basic setup 16 1.1.1. Configuration wizard 16 1.2. License Activation 21 1.3. Scan Files with Metadefender Core 21 2. Installing or Upgrading Metadefender Core 22 2.1. Recommended System Requirements 22 System Requirements For Server 22 Browser Requirements for the Metadefender Core Management Console 24 2.2. Installing Metadefender 25 Installation 25 Installation notes 25 2.2.1. Installing Metadefender Core using command line 26 2.2.2. Installing Metadefender Core using the Install Wizard 27 2.3. Upgrading MetaDefender Core 27 Upgrading from MetaDefender Core 3.x 27 Upgrading from MetaDefender Core 4.x 28 2.4. Metadefender Core Licensing 28 2.4.1. Activating Metadefender Licenses 28 2.4.2. Checking Your Metadefender Core License 35 2.5. Performance and Load Estimation 36 What to know before reading the results: Some factors that affect performance 36 How test results are calculated 37 Test Reports 37 Performance Report - Multi-Scanning On Linux 37 Performance Report - Multi-Scanning On Windows 41 2.6. Special installation options 46 Use RAMDISK for the tempdirectory 46 3. Configuring Metadefender Core 50 3.1. Management Console 50 3.2.
    [Show full text]
  • Valami Commander Felhasználói És Fejlesztői Dokumentáció
    Tuska Balázs Valami Commander Felhasználói és Fejlesztői Dokumentáció Témavezető: Porkoláb Zoltán ELTE IK 2004 1 Tartalomjegyzék 1. Bevezető...............................................................................................................................4 1.1. A programról.................................................................................................................4 1.1.1. Motiváció és történet.............................................................................................5 1.1.2. Mire használható?.................................................................................................7 1.1.3. Mire nem használható?.........................................................................................7 1.2. Telepítés........................................................................................................................7 1.2.1. Követelmények és Ajánlások................................................................................7 1.2.2. A telepítés menete.................................................................................................8 2. Funkciók részletesen a felhasználók számára.......................................................................9 2.1. A fő ablak......................................................................................................................9 2.1.1. Panelek................................................................................................................10 2.1.2. A parancssor........................................................................................................11
    [Show full text]
  • Metadefender Core V4.17.3
    MetaDefender Core v4.17.3 © 2020 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of MetaDefender Core 14 1. Quick Start with MetaDefender Core 15 1.1. Installation 15 Operating system invariant initial steps 15 Basic setup 16 1.1.1. Configuration wizard 16 1.2. License Activation 21 1.3. Process Files with MetaDefender Core 21 2. Installing or Upgrading MetaDefender Core 22 2.1. Recommended System Configuration 22 Microsoft Windows Deployments 22 Unix Based Deployments 24 Data Retention 26 Custom Engines 27 Browser Requirements for the Metadefender Core Management Console 27 2.2. Installing MetaDefender 27 Installation 27 Installation notes 27 2.2.1. Installing Metadefender Core using command line 28 2.2.2. Installing Metadefender Core using the Install Wizard 31 2.3. Upgrading MetaDefender Core 31 Upgrading from MetaDefender Core 3.x 31 Upgrading from MetaDefender Core 4.x 31 2.4. MetaDefender Core Licensing 32 2.4.1. Activating Metadefender Licenses 32 2.4.2. Checking Your Metadefender Core License 37 2.5. Performance and Load Estimation 38 What to know before reading the results: Some factors that affect performance 38 How test results are calculated 39 Test Reports 39 Performance Report - Multi-Scanning On Linux 39 Performance Report - Multi-Scanning On Windows 43 2.6. Special installation options 46 Use RAMDISK for the tempdirectory 46 3.
    [Show full text]
  • Metod LR OS 09.03.02 2020
    МИНИCTEPCTBO НАУКИ И ВЫСШЕГО ОБРАЗОВАНИЯ РОССИЙСКОЙ ФЕДЕРАЦИИ Федеральное государственное автономное образовательное учреждение высшего образования «СЕВЕРО-КАВКАЗСКИЙ ФЕДЕРАЛЬНЫЙ УНИВЕРСИТЕТ» Институт сервиса, туризма и дизайна (филиал) СКФУ в г. Пятигорске МЕТОДИЧЕСКИЕ УКАЗАНИЯ ПО ВЫПОЛНЕНИЮ ЛАБОРАТОРНЫХ РАБОТ ПО ДИСЦИПЛИНЕ «ОПЕРАЦИОННЫЕ СИСТЕМЫ» для студентов направления 09.03.02 Информационные системы и технологии Пятигорск, 2020 Методические указания предназначены для студентов направления 09.03.02 «Информационные системы и технологии» очной формы обучения и содержат материалы и задания для выполнения лабораторных работ по дисциплине «Операционные системы» Рассмотрено и утверждено на заседании кафедры Систем управления и информационных технологий протокол № ___ от _______________2020 Зав.кафедрой «Системы управления и информационные технологии» ____________________________ Першин И.М. Составитель: Доцент кафедры «Системы управления и информационные технологии» _____________________________ Мишин В.В. 2 СОДЕРЖАНИЕ Лабораторная работа №1 Работа с операционной системой MS DOS 4 Лабораторная работа №2 Работа с операционной системой MS Windows ХР. 14 Лабораторная работа №3 Настройка локальной сети в операционной системе MS Windows ХР. Лабораторная работа №4. Файловые менеджеры Total Commander и Far Manager 34 Лабораторная работа №5 Средства защиты информации в сети. 43 Лабораторная работа №6 Операционная система LINUX. 58 3 Лабораторная работа № 1 Работа с операционной системой MS DOS. Цель работы: освоить основные приемы работы с ОС MS-DOS Формируемые компетенции Индекс Формулировка: ОПК-5 Способен инсталлировать программное и аппаратное обеспечение для информационных и автоматизированных систем Способен осуществлять выбор платформ и инструментальных ОПК-7 программно-аппаратных средств для реализации информационных систем Теоретическая часть 1.Загрузка операционной системы MS-DOS Перейдем к лабораторной работе на персональном компьютере. Мы должны проверить, установлена ли на диске компьютера операционная система MS-DOS, и при необходимости установить ее.
    [Show full text]
  • „Operētājsistēmas” Mācību Materiāli
    IZGLĪTĪBAS UN ZINĀTNES MINISTRIJAS RĒZEKNES PROFESIONĀLĀ VIDUSSKOLA „OPERĒTĀJSISTĒMAS” MĀCĪBU MATERIĀLI SKOLOTĀJS: DAINIS SUSEJS RĒZEKNE , 2 0 0 7 2 Mācību materiāli izstrādāti Rēzeknes Profesionālajā vidusskolā, īstenojot ESF projektu „Profesionālās vidējās izglītības programmu „Viesnīcu serviss” un „Datorsistēmas” uzlabošana”, projekta identifikācijas Nr. VPD1/ESF/PIAA/04/APK/3.2.1./0028/0145, laikā no 07.11.2005. līdz 06.12.2007. Projektu administrēja valsts aģentūra „Profesionālās izglītības attīstības aģentūra” (līgums Nr. 2005/0266/VPD1/ESF/PIAA/04/APK/3.2.1./0028/0145). 3 Saturs Ievads ............................................................................................................................... 5 1. Operētājsistēmas (OS) jēdzieni ............................................................................. 6 1.1. OS klasifikācija ................................................................................................ 6 1.2. OS izvēles kritēriji un iegādes iespējas ............................................................. 7 1.2.1. Microsoft licences ........................................................................................ 7 1.2.2. Atklātais pirmkods ..................................................................................... 16 2. BIOS ..................................................................................................................... 18 Praktiskā darba uzdevumi ........................................................................................... 21 3. OS
    [Show full text]
  • CIT381 COURSE TITLE: File Processing and Management
    NATIONAL OPEN UNIVERSITY OF NIGERIA SCHOOL OF SCIENCE AND TECHNOLOGY COURSE CODE: CIT381 COURSE TITLE: File Processing and Management CIT381 COURSE GUIDE COURSE GUIDE CIT381 FILE PROCESSING AND MANAGEMENT Course Team Ismaila O. Mudasiru (Developer/Writer) - OAU NATIONAL OPEN UNIVERSITY OF NIGERIA ii CIT381 COURSE GUIDE National Open University of Nigeria Headquarters 14/16 Ahmadu Bello Way Victoria Island Lagos Abuja Office No. 5 Dar es Salaam Street Off Aminu Kano Crescent Wuse II, Abuja Nigeria e-mail: [email protected] URL: www.nou.edu.ng Published By: National Open University of Nigeria First Printed 2011 ISBN: 978-058-525-7 All Rights Reserved CONTENTS PAGE iii CIT381 COURSE GUIDE Introduction …………………..…………………………………… 1 What You Will Learn in this Course………………………………. 1 Course Aims ………………………………………………………. 2 Course Objectives …………………………………………………. 2 Working through this Course………………………….…………… 3 The Course Materials………………………………………………. 3 Study Units…………………………………………………………. 3 Presentation Schedule……………….……………………………… 4 Assessment…………………………………………………………. 5 Tutor-Marked Assignment…………………………………………. 5 Final Examination and Grading……………………………………. 6 Course Marking Scheme…………………………………………… 6 Facilitators/Tutors and Tutorials…………………………………… 6 Summary…………………………………………………………… 7 iv CIT381 FILE PROCESSING AND MANAGEMENT Introduction File Processing and Management is a second semester course. It is a 2- credit course that is available to students offering Bachelor of Science, B. Sc., Computer Science, Information Systems and Allied degrees. Computers can store information on several different types of physical media. Magnetic tape, magnetic disk and optical disk are the most common media. Each of these media has its own characteristics and physical organisation. For convenience use of the computer system, the operating system provides a uniform logical view of information storage. The operating system abstracts from the physical properties of its storage devices to define a logical storage unit, the file.
    [Show full text]
  • Metadefender Core V4.10.1
    MetaDefender Core v4.10.1 © 2018 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of Metadefender Core 14 1. Quick Start with Metadefender Core 15 1.1. Installation 15 Installing Metadefender Core on Ubuntu or Debian computers 15 Installing Metadefender Core on Red Hat Enterprise Linux or CentOS computers 15 Installing Metadefender Core on Windows computers 16 1.2. License Activation 16 1.3. Scan Files with Metadefender Core 17 2. Installing or Upgrading Metadefender Core 18 2.1. Recommended System Requirements 18 System Requirements For Server 18 Browser Requirements for the Metadefender Core Management Console 20 2.2. Installing Metadefender Core 20 Installation 20 Installation notes 21 2.2.1. Installing Metadefender Core using command line 21 2.2.2. Installing Metadefender Core using the Install Wizard 23 2.3. Upgrading MetaDefender Core 23 Upgrading from MetaDefender Core 3.x 23 Upgrading from MetaDefender Core 4.x 23 2.4. Metadefender Core Licensing 24 2.4.1. Activating Metadefender Core Licenses 24 2.4.2. Checking Your Metadefender Core License 30 2.5. Performance and Load Estimation 31 What to know before reading the results: Some factors that affect performance 31 How test results are calculated 32 Test Reports 32 Performance Report - Multi-Scanning On Linux 32 Performance Report - Multi-Scanning On Windows 36 2.6. Special installation options 41 Use RAMDISK for the tempdirectory 41 3.
    [Show full text]
  • Dokumentációdokumentáció
    dokumentációdokumentáció Szabadulj meg végre a Windows-tól! Megmutatjuk, hogyan térjünk át blackPanther OS-re. Szabadon terjeszthető a Creative Commons BY-NC-ND 3.0 Licenc feltételeivel DokumentációDokumentáció Hogyan térjünk át blackPanther OS-re más operációs rendszerekről. Hogyan kell használni. Mit merre találunk. Mit, hogy kell érteni és értelmezni! NegyedikNegyedik kiadáskiadás Szerző : Barcza Károly A blackPanther név semmilyen módon nem kapcsolódik faji vagy politikai nézetekhez! Hivatalos weboldalaink: www.blackpantheros.eu – www.blackpanther.hu Youtube csatorna: youtube.com/c/blackPantherEurope Facebook márkaoldal: facebook.com/blackPantherOS.Eu Twitter olddal: twitter.com/blackPantherOS Közösségi weboldal: blackpantheroshogyan.blogspot.com Felhasználói csoport a Facebook-on : facebook.com/groups/blackPantherOS 2018 (v0.7) Alkotók: Barcza Károly [email protected] LibreOfce Angol fordítás és Egyéb javítások korrigációk: korrigációk: korrigációk: Szlávy Anna Czeper-Tóth Gábor Molnár Péter [email protected] Lektorálta: Molnár Péter informatika tanár [email protected] A korábbi kiadáson a legtöbb munkát ők végezték: A korábbi változat segédszerzője: Kretz Ferenc (kregist) [email protected] Korrektor: Kovács Zsolt (kovi) [email protected] E dokumentumot bármilyen formában, részben, vagy teljes egészében sokszorosítani, rögzíteni, vagy bármilyen más módon hasznosítani a szerzők írásbeli engedélye nélkül tilos ! blackPanther OS dokumentáció AjánlásAjánlás A dokumentációt azoknak ajánlanám elsősorban, akik
    [Show full text]
  • Freeware-List.Pdf
    FreeWare List A list free software from www.neowin.net a great forum with high amount of members! Full of information and questions posted are normally answered very quickly 3D Graphics: 3DVia http://www.3dvia.com...re/3dvia-shape/ Anim8or - http://www.anim8or.com/ Art Of Illusion - http://www.artofillusion.org/ Blender - http://www.blender3d.org/ CreaToon http://www.creatoon.com/index.php DAZ Studio - http://www.daz3d.com/program/studio/ Freestyle - http://freestyle.sourceforge.net/ Gelato - http://www.nvidia.co...ge/gz_home.html K-3D http://www.k-3d.org/wiki/Main_Page Kerkythea http://www.kerkythea...oomla/index.php Now3D - http://digilander.li...ng/homepage.htm OpenFX - http://www.openfx.org OpenStages http://www.openstages.co.uk/ Pointshop 3D - http://graphics.ethz...loadPS3D20.html POV-Ray - http://www.povray.org/ SketchUp - http://sketchup.google.com/ Sweet Home 3D http://sweethome3d.sourceforge.net/ Toxic - http://www.toxicengine.org/ Wings 3D - http://www.wings3d.com/ Anti-Virus: a-squared - http://www.emsisoft..../software/free/ Avast - http://www.avast.com...ast_4_home.html AVG - http://free.grisoft.com/ Avira AntiVir - http://www.free-av.com/ BitDefender - http://www.softpedia...e-Edition.shtml ClamWin - http://www.clamwin.com/ Microsoft Security Essentials http://www.microsoft...ity_essentials/ Anti-Spyware: Ad-aware SE Personal - http://www.lavasoft....se_personal.php GeSWall http://www.gentlesec...m/download.html Hijackthis - http://www.softpedia...ijackThis.shtml IObit Security 360 http://www.iobit.com/beta.html Malwarebytes'
    [Show full text]
  • Magazyn Dragonia
    Numer 27 – 2008 Bash Prompt HOWTO, czyli czarowanie znaku zachęty Artykuł przedstawia sposoby na two- rzenie ciekawych znaków zachęty w konsoli oraz xtermach wykorzystu- jących powłokę Bash. Ciekawych to mało, ale również kolorowych! Całość na stronie7 Z YouTube na dysk Serwisy typu YouTube miały zawsze jedną wadę – przy słabym łączu oglą- danie czegokolwiek staje się koszma- rem. Próżno szukać opcji umożliwiają- cych zapisanie filmów na dysku, takie działanie jest bowiem sprzeczne z in- teresami właścicieli serwisu. Artykuł przedstawia kilka sposobów na ścią- gnięcie naszych ulubionych filmów. Całość na stronie 35 Pdftk – PDF Toolkit O tym jak łączyć i dzielić pliki PDF; jak je zaszyfrować, odszyfrować; jak do- dać znak wodny lub załącznik do pli- ku PDF za pomocą narzędzia Pdftk. Całość na stronie 23 Wstępniak Spis treści Drodzy Czytelnicy System Przekazujemy do Waszych rąk świąteczny Cyfrowa farma, czyli co wybrać?............................3 numer Dragonii. To już trzeci taki numer Bash Prompt HOWTO, czyli czarowanie znaku zachęty.....................7 w naszej historii. Dzięki Wam chcemy wciąż Wstęp do Debiana................................. 14 pisać dla Was, z Was rekrutuje się nasza re- Zarządzanie pakietami w Debianie............................ 16 dakcja. Dziękuję Wam, że jesteście. W numerze dwa artykuły o Debianie, Konkurs czyli jak dobrze zacząć, by nie móc z nim Software skończyć. Dla pewności będziemy w tym LATEXowanie w GTK+ – krótki przegląd edytorów....................... 20 utwierdzani w kolejnych numerach. Pdftk – PDF Toolkit................................. 23 Obok innych artykułów polecam prze- System dla początkujących użytkowników Olá! Dom 6.06 A gląd edytorów do LTEX-a, tak byście mogli – odtwarzanie muzyki i filmów............................. 25 wybrać któryś dla siebie. Niebawem wracają JPC – Java PC (x86) Emulator............................
    [Show full text]
  • Tizimli Dasturiy Ta'minot
    • YM. M.M.Aliyev,E.T.Toxirov TIZIMLI DASTURIY TA'MINOT Uslubiy qo'Uanma Toshl en ·· 2012 - -- ~--- «O'zbekiston temir yo'llari» DATK Toshkent temir yo'l muhandislari instituti M.M.Aliyev, E.T.Toxirov TIZIMLI DASTURIY TA'MINOT 5521900 - "lnformatika va axborot texnologiyalari" ta'lim yo'nalishi 2 - bosqich bakalavriat talabalari uchun uslubiy qo'llanma 6V! 6j"H ~OTe K a t T~wV!VlTa ------ ~ )' Toshkent - 2012 UDK651.31 Tizimli dasturiy ta'minot. Uslubiy qo'llanma. M.M.Aliyev, E.T.Toxirov. ToshTYMI, T.: 2012, 44 bet. Ushbu uslubiy qo'llanma kompyuter dasturiy ta'minoti va tizimli dasturiy ta'minoti: operatsion tizimlar, fayl menejerlari, utilita dasturlari, kompyuterning xavfsizligi asoslari kabi bilimlarni egallashga mo'ljallangan bo'lib, unda talabalarga nazariz jihatdan asosiy YO'nalishlar berilgan. Uslubiy qo'llanrna 5521900 - "Informatika va axborot texnologiyalari" ta'lim YO'nalishida tahsil oluvchi 2-bosqich bakalavriat talabalariga bilimlarini mustahkamlashlari uchun ishlab chiqilgan. Institut O'quv-uslubiy komissiyasi tomonidan nashrga tavsiya etilgan. Taqrizchilar: U.F. Karimov - t.f.n., dots. (ToshDMI); R.I. Ibragimov - t.f.n., dots. © Toshkent temir yo'l muhandislari instituti, 2012 Kirish Istalgan shaxsiy kompyuter, hattoki so'ngi rusumdagi zamonaviy kompyuter bo'lsada, u dasturiy taminotsiz shunchaki uskunadan boshqa narsa emas. Bunday holatda u eng elementar masalani ham hal eta olmaydi. Buning uchun dasturiy ta'minot muhim ahamiyatga ega. (DT yoki software). Dasturiy ta'miton - dasturlar to'plami bo'lib, u kompyuter muhitida
    [Show full text]